IOC Report
PTT Group project - Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
PTT Group project - Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1-673479
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\autC8E0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autC92F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\savager
ASCII text, with very long lines (28756), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ultraradicalism
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PTT Group project - Quotation.exe
"C:\Users\user\Desktop\PTT Group project - Quotation.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PTT Group project - Quotation.exe"
malicious
C:\Program Files (x86)\wyhexRQvvsUNbykgmUZEyCDIVqvoVFvXanvNWKmivskHrhUeeNqur\KWyVcOvVIsFTpZOKF.exe
"C:\Program Files (x86)\wyhexRQvvsUNbykgmUZEyCDIVqvoVFvXanvNWKmivskHrhUeeNqur\KWyVcOvVIsFTpZOKF.exe"
malicious
C:\Windows\SysWOW64\RMActivate_ssp.exe
"C:\Windows\SysWOW64\RMActivate_ssp.exe"
malicious
C:\Program Files (x86)\wyhexRQvvsUNbykgmUZEyCDIVqvoVFvXanvNWKmivskHrhUeeNqur\KWyVcOvVIsFTpZOKF.exe
"C:\Program Files (x86)\wyhexRQvvsUNbykgmUZEyCDIVqvoVFvXanvNWKmivskHrhUeeNqur\KWyVcOvVIsFTpZOKF.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.binpvae.lol/kfqo/?9TND4h=NiOdQOuMLD2zHgMWwKws4JzuutDmLpx3tWxYTf2s7ZGupi3Uz5m5Dts89dE7D44P7JMDqAvEJ+8u+Llyo4b9pPx+fjdmUm+qFImntH+EZRPwIZM2dcS4AHM=&MXOD=nDFLlbM87h
116.213.43.190
malicious
http://www.a9jcpf.top/1kbe/
147.92.36.231
malicious
http://www.ytw6.top/rmef/?9TND4h=UdI5Nug9LeCq3QKyZxAFTuhDHYNaCA3T0/tR5L8b4jWaA2fUCVH3fLw1ebDEBIsiTWaLxfrgjTz4bD/84RJrNmZZ6yqPN++//ptV/K/4BOxQ2TPEoKO+wL0=&MXOD=nDFLlbM87h
38.47.232.224
malicious
http://www.lexiecos.top/ff8d/
203.161.55.102
malicious
http://www.webuyfontana.com/cns4/
13.248.169.48
malicious
http://www.binpvae.lol/kfqo/
116.213.43.190
malicious
http://www.webuyfontana.com/cns4/?MXOD=nDFLlbM87h&9TND4h=b+X9HsydX2EZhoFbHWDGWLn8qSDjJiBvgg2FVhcLABkhzzs0ucmBPDMRqtKe3XUMFDw5FS9Ji9Imkcb4M+SgV1CrLIKWT8R/LC2e+AlJEb/hHwO3uGNSJEs=
13.248.169.48
malicious
http://www.ytw6.top/rmef/
38.47.232.224
malicious
http://www.mhtnvro.lol/il19/
116.213.43.190
malicious
http://www.lexiecos.top/ff8d/?MXOD=nDFLlbM87h&9TND4h=ohJD03igrpR8lwlwc1M4EqZrzingiHicFb+y4T5GGfrPyp+0FgUaOIwicDYxE9IqyQjr9lfiRuNbkNF7eyT6Zergy2OfkJkLywWhdn0W3d/t29Aith2p64g=
203.161.55.102
malicious
http://www.mhtnvro.lol/il19/?9TND4h=2W0Inf+zka60rkge6x3gGQQeo1iuz6hi+bPXuzv4I1vHSGtqZzoorLZZnoCmwyX2i4rMR0gWWwZYBzao7rAttPu5367SyozTICrQ88OWOZt9joXCP1iWm4I=&MXOD=nDFLlbM87h
116.213.43.190
malicious
http://www.hsck520.com
unknown
malicious
http://www.778981.com/p1dd/?MXOD=nDFLlbM87h&9TND4h=G7DDmCfNGXy3uJCEgcIIU1iXFvarFYWbvsRS9sxoYaNScQyM2A1goKEbo8KV9mX8trrejs5AH6YGa7AwDEXag2zD7gw0a+PZJfygUURv+5LCwJWR5NAeUOI=
165.154.0.120
malicious
http://www.augaqfp.lol/l8a4/
116.213.43.190
malicious
http://www.augaqfp.lol/l8a4/?9TND4h=CPL7YN3vcnDyuUFtA6pv3uMhLFbLrJb1JE9LZisFmiEQ0vYrwOGtj9QBvlTfLzXcbjIACE/TYt0vO88JJ7+OI7LCsTQn12dDmlA0tsWVEcE74AqN9n1fFjE=&MXOD=nDFLlbM87h
116.213.43.190
malicious
https://cdn.livechatinc.com/tracking.js
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://download.quark.cn/download/quarkpc?platform=android&ch=pcquark
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/performance.js
unknown
https://duckduckgo.com/ac/?q=
unknown
https://g.alicdn.com/woodpeckerx/jssdk/plugins/globalerror.js
unknown
https://track.uc.cn/collect
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.hsck520.com/2e2r/
35.190.52.58
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://v-cn.vaptcha.com/v3.js
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/archer_index.e96dc6dc6863835f4ad0.js
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://hm.baidu.com/hm.js?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://g.alicdn.com/woodpeckerx/jssdk/wpkReporter.js
unknown
https://www.livechat.com/chat-with/14282961/
unknown
https://www.livechat.com/?welcome
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://image.uc.cn/s/uae/g/3o/berg/static/index.c4bc5b38d870fecd8a1f.css
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ytw6.top
38.47.232.224
malicious
aj.ajunsdfancsda.com
147.92.36.231
malicious
www.binpvae.lol
116.213.43.190
malicious
www.lexiecos.top
203.161.55.102
malicious
www.augaqfp.lol
116.213.43.190
malicious
www.mhtnvro.lol
116.213.43.190
malicious
7a4ca695fd164z.greycdn.net
165.154.0.120
malicious
www.webuyfontana.com
13.248.169.48
malicious
www.778981.com
unknown
malicious
www.byteffederal.com
unknown
malicious
www.jjkelker.com
unknown
malicious
www.ytw6.top
unknown
malicious
www.caroinapottery.com
unknown
malicious
www.a9jcpf.top
unknown
malicious
www.mebutnotme.store
unknown
malicious
www.hsck520.com
35.190.52.58
There are 6 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.248.169.48
www.webuyfontana.com
United States
malicious
203.161.55.102
www.lexiecos.top
Malaysia
malicious
165.154.0.120
7a4ca695fd164z.greycdn.net
Canada
malicious
147.92.36.231
aj.ajunsdfancsda.com
Hong Kong
malicious
38.47.232.224
ytw6.top
United States
malicious
116.213.43.190
www.binpvae.lol
Hong Kong
malicious
35.190.52.58
www.hsck520.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
30D0000
trusted library allocation
page read and write
malicious
29A0000
system
page execute and read and write
malicious
EE0000
unclassified section
page execute and read and write
malicious
24B0000
unkown
page execute and read and write
malicious
2F50000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
5020000
system
page execute and read and write
malicious
3B50000
unclassified section
page execute and read and write
malicious
103D000
heap
page read and write
2FD1000
heap
page read and write
69E000
unkown
page readonly
2ED1000
unkown
page execute and read and write
76A000
stack
page read and write
710000
heap
page read and write
50D7000
system
page execute and read and write
361C000
unkown
page read and write
2BEC000
unkown
page read and write
2DCB000
heap
page read and write
FDA000
heap
page read and write
37F3000
direct allocation
page read and write
2E1B000
heap
page read and write
22C0000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
6A5000
unkown
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
FD2000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3B42000
direct allocation
page execute and read and write
2FD1000
heap
page read and write
63DF000
unclassified section
page execute and read and write
2FD1000
heap
page read and write
EE0000
direct allocation
page read and write
8C0000
heap
page read and write
3013000
heap
page read and write
4B76000
unclassified section
page read and write
45DF000
unclassified section
page execute and read and write
2FD1000
heap
page read and write
6E0000
unkown
page readonly
4550000
unclassified section
page execute and read and write
3250000
trusted library allocation
page read and write
69E000
unkown
page readonly
3013000
heap
page read and write
C0E000
stack
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2E4E000
heap
page read and write
99F000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
16C122EB000
heap
page read and write
2FD1000
heap
page read and write
37A3000
direct allocation
page read and write
2FD1000
heap
page read and write
3523000
heap
page read and write
DFE000
stack
page read and write
321A000
heap
page read and write
16C13E0A000
trusted library allocation
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
16C13D00000
trusted library allocation
page read and write
16C12230000
heap
page read and write
2800000
heap
page read and write
7C0000
unkown
page readonly
3929000
direct allocation
page execute and read and write
2DB0000
heap
page read and write
69E000
unkown
page readonly
2E41000
heap
page read and write
360D000
direct allocation
page execute and read and write
50F9000
unkown
page read and write
22D0000
unkown
page readonly
4E9A000
unclassified section
page read and write
7E1C000
heap
page read and write
2FD1000
heap
page read and write
1113000
heap
page read and write
7EE0000
trusted library allocation
page read and write
69E000
unkown
page readonly
2FD1000
heap
page read and write
DFF000
heap
page read and write
2E4C000
heap
page read and write
7DF6000
heap
page read and write
49E4000
unclassified section
page read and write
2FD1000
heap
page read and write
2F30000
heap
page read and write
2FD1000
heap
page read and write
560000
unkown
page readonly
16C12260000
heap
page read and write
16C13FCE000
trusted library allocation
page read and write
2FD1000
heap
page read and write
2DC3000
heap
page read and write
2FD1000
heap
page read and write
690000
unkown
page readonly
37A3000
direct allocation
page read and write
3013000
heap
page read and write
7E13000
heap
page read and write
7DE1000
heap
page read and write
2FD1000
heap
page read and write
D40000
unkown
page readonly
2968000
stack
page read and write
2E8F000
heap
page read and write
16C122F2000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
691000
unkown
page execute read
2FD1000
heap
page read and write
2FD1000
heap
page read and write
C70000
unkown
page readonly
2FD1000
heap
page read and write
7D0000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
16C122DC000
heap
page read and write
DE8000
heap
page read and write
D40000
unkown
page readonly
22C0000
heap
page read and write
2E34000
heap
page read and write
850000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
6A5000
unkown
page read and write
E20000
direct allocation
page read and write
70E000
stack
page read and write
7C0000
unkown
page readonly
DB0000
unkown
page read and write
3682000
direct allocation
page execute and read and write
3999000
direct allocation
page read and write
3301000
heap
page read and write
379E000
heap
page read and write
3680000
direct allocation
page read and write
2FD1000
heap
page read and write
4571000
unclassified section
page execute and read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
3340000
direct allocation
page execute and read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3AD1000
direct allocation
page execute and read and write
3D54000
unclassified section
page read and write
2FD1000
heap
page read and write
433F000
unkown
page execute and read and write
691000
unkown
page execute read
46C0000
unclassified section
page read and write
3A0E000
direct allocation
page read and write
2FD4000
unkown
page read and write
16C13AA0000
trusted library allocation
page read and write
39BE000
direct allocation
page read and write
2FD1000
heap
page read and write
620000
unkown
page read and write
39BE000
direct allocation
page read and write
2FD1000
heap
page read and write
854F000
stack
page read and write
224F000
stack
page read and write
9CF000
unkown
page write copy
2FD1000
heap
page read and write
2FD1000
heap
page read and write
7D0000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
FBADFC000
stack
page read and write
2FD0000
heap
page read and write
2FD1000
heap
page read and write
2C20000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
9C5000
unkown
page readonly
399D000
direct allocation
page read and write
7E09000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
43A000
stack
page read and write
9AF000
stack
page read and write
C10000
unkown
page read and write
63B0000
trusted library allocation
page read and write
103E000
heap
page read and write
1B9F000
stack
page read and write
50CB000
system
page execute and read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
C70000
unkown
page readonly
550000
unkown
page readonly
2FD1000
heap
page read and write
372D000
heap
page read and write
550000
unkown
page readonly
CE0000
heap
page read and write
2FD1000
heap
page read and write
3013000
heap
page read and write
6F0000
unkown
page readonly
10CF000
heap
page read and write
36D0000
direct allocation
page read and write
DE0000
heap
page read and write
C10000
unkown
page read and write
16C13E00000
trusted library allocation
page read and write
2DC0000
heap
page read and write
103F000
heap
page read and write
2E84000
heap
page read and write
7B0000
unkown
page readonly
9B0000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
5BE000
stack
page read and write
2FD1000
heap
page read and write
399E000
direct allocation
page execute and read and write
FE0000
heap
page read and write
2FD1000
heap
page read and write
53C000
stack
page read and write
3212000
heap
page read and write
332A000
heap
page read and write
290F000
stack
page read and write
2FD1000
heap
page read and write
3949000
direct allocation
page read and write
630000
heap
page read and write
2FD1000
heap
page read and write
9C5000
unkown
page readonly
37F3000
direct allocation
page read and write
50BB000
system
page execute and read and write
1270000
unkown
page readonly
C6C000
stack
page read and write
7B8000
heap
page read and write
2FD1000
heap
page read and write
FE0000
heap
page read and write
630000
heap
page read and write
10F4000
heap
page read and write
2FD1000
heap
page read and write
C90000
heap
page read and write
620000
unkown
page read and write
2E8A000
heap
page read and write
2FD1000
heap
page read and write
24A0000
heap
page read and write
570000
heap
page read and write
10E4000
heap
page read and write
D30000
heap
page read and write
7E0000
unkown
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3776000
heap
page read and write
7DFB000
heap
page read and write
2FD1000
heap
page read and write
16C122C0000
heap
page read and write
9D8000
unkown
page readonly
3692000
unclassified section
page read and write
2FD1000
heap
page read and write
392D000
direct allocation
page execute and read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3680000
direct allocation
page read and write
5E0000
unkown
page read and write
691000
unkown
page execute read
EA0000
direct allocation
page read and write
2E2D000
heap
page read and write
2FC0000
heap
page read and write
3250000
trusted library allocation
page read and write
2E2A000
heap
page read and write
3940000
unkown
page read and write
2FD1000
heap
page read and write
10E4000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2E07000
heap
page read and write
2E2F000
heap
page read and write
2FD1000
heap
page read and write
C6E000
stack
page read and write
2FD1000
heap
page read and write
690000
unkown
page readonly
16C13C80000
heap
page read and write
7B0000
heap
page read and write
2FD1000
heap
page read and write
2DCB000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
16C13AA0000
trusted library allocation
page read and write
EE0000
direct allocation
page read and write
32B5000
heap
page read and write
3680000
direct allocation
page read and write
24A0000
heap
page read and write
E3C000
stack
page read and write
EE0000
unkown
page readonly
2FD1000
heap
page read and write
31B0000
trusted library allocation
page execute and read and write
2E2A000
heap
page read and write
3013000
heap
page read and write
2E37000
heap
page read and write
3800000
direct allocation
page execute and read and write
396C000
unclassified section
page read and write
7DF1000
heap
page read and write
3469000
direct allocation
page execute and read and write
3700000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3999000
direct allocation
page read and write
2E20000
heap
page read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
EE0000
direct allocation
page read and write
2FD1000
heap
page read and write
16C13FC4000
trusted library allocation
page read and write
3ACD000
direct allocation
page execute and read and write
2E5C000
heap
page read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
819E000
stack
page read and write
2E2F000
heap
page read and write
2FD1000
heap
page read and write
2F3F000
unkown
page execute and read and write
10AD000
heap
page read and write
2FD1000
heap
page read and write
7F1000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
700000
unkown
page readonly
3013000
heap
page read and write
394D000
direct allocation
page read and write
3F0000
heap
page read and write
2FD1000
heap
page read and write
3701000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
30F3000
heap
page read and write
2FD1000
heap
page read and write
3217000
heap
page read and write
600000
unkown
page readonly
7B8000
heap
page read and write
43A000
stack
page read and write
FE0000
heap
page read and write
2FD1000
heap
page read and write
16C13FBE000
trusted library allocation
page read and write
2FD1000
heap
page read and write
67E000
stack
page read and write
AFC000
stack
page read and write
190000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3000000
heap
page read and write
37A3000
direct allocation
page read and write
2E37000
heap
page read and write
2E41000
heap
page read and write
4D3F000
unkown
page execute and read and write
6E0000
unkown
page readonly
3205000
heap
page read and write
37F3000
direct allocation
page read and write
2FD1000
heap
page read and write
600000
unkown
page readonly
2FD1000
heap
page read and write
2704000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
180000
unkown
page readonly
50F5000
unkown
page read and write
DE8000
heap
page read and write
2FD1000
heap
page read and write
50B1000
system
page execute and read and write
2FD1000
heap
page read and write
7B0000
unkown
page readonly
7DEC000
heap
page read and write
6F0000
unkown
page readonly
911000
unkown
page execute read
2FD1000
heap
page read and write
2FD1000
heap
page read and write
16C13E03000
trusted library allocation
page read and write
2704000
heap
page read and write
7A0000
unkown
page readonly
720000
heap
page read and write
32B9000
heap
page read and write
179E000
stack
page read and write
103C000
heap
page read and write
540000
unkown
page readonly
3870000
direct allocation
page read and write
7A0000
unkown
page readonly
180000
unkown
page readonly
911000
unkown
page execute read
16C13E0F000
trusted library allocation
page read and write
7E03000
heap
page read and write
76D000
stack
page read and write
6A5000
unkown
page read and write
2FD1000
heap
page read and write
6A5000
unkown
page read and write
2DBB000
heap
page read and write
2E62000
heap
page read and write
E1B000
stack
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
EE0000
unkown
page readonly
2E94000
heap
page read and write
2800000
heap
page read and write
2FD1000
heap
page read and write
318C000
heap
page read and write
1113000
heap
page read and write
2FD1000
heap
page read and write
3DF6000
unkown
page read and write
2C44000
heap
page read and write
700000
unkown
page readonly
2FD1000
heap
page read and write
8E0000
heap
page read and write
2FD1000
heap
page read and write
FBBDFE000
stack
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
FBC5FE000
stack
page read and write
22D0000
unkown
page readonly
2FD1000
heap
page read and write
5C0000
unkown
page read and write
3013000
heap
page read and write
7DFE000
heap
page read and write
690000
unkown
page readonly
3870000
direct allocation
page read and write
2FD1000
heap
page read and write
9D3000
unkown
page write copy
38A000
stack
page read and write
103D000
heap
page read and write
3110000
trusted library allocation
page read and write
910000
unkown
page readonly
2FD1000
heap
page read and write
16C120A8000
system
page execute and read and write
76A000
stack
page read and write
2E20000
heap
page read and write
2700000
heap
page read and write
1103000
heap
page read and write
3820000
direct allocation
page read and write
560000
unkown
page readonly
12694000
system
page read and write
5D1000
unkown
page readonly
2FD1000
heap
page read and write
AFC000
stack
page read and write
12092000
system
page read and write
3A0E000
direct allocation
page read and write
3A0E000
direct allocation
page read and write
2FD1000
heap
page read and write
2E59000
heap
page read and write
7E10000
heap
page read and write
32CE000
stack
page read and write
394D000
direct allocation
page read and write
393F000
unkown
page execute and read and write
99F000
unkown
page readonly
2FD1000
heap
page read and write
DA0000
unkown
page read and write
CAA000
stack
page read and write
3400000
heap
page read and write
122AC000
system
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2A2C000
unkown
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
C90000
heap
page read and write
7E0000
unkown
page read and write
2FD1000
heap
page read and write
3600000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
D9F000
stack
page read and write
5E0000
unkown
page read and write
1103000
heap
page read and write
292B000
stack
page read and write
6A7000
unkown
page readonly
16C12140000
heap
page read and write
D00000
heap
page read and write
7E27000
heap
page read and write
2FD1000
heap
page read and write
690000
unkown
page readonly
5C0000
unkown
page read and write
FA0000
heap
page read and write
2FD1000
heap
page read and write
910000
unkown
page readonly
2FD1000
heap
page read and write
2C44000
heap
page read and write
3870000
direct allocation
page read and write
2FD1000
heap
page read and write
399D000
direct allocation
page read and write
2FD1000
heap
page read and write
35FF000
stack
page read and write
2FD1000
heap
page read and write
39BE000
direct allocation
page read and write
1020000
heap
page read and write
26BC000
unkown
page read and write
2FD1000
heap
page read and write
1103000
heap
page read and write
1103000
heap
page read and write
16C13F01000
trusted library allocation
page read and write
2FD1000
heap
page read and write
E0E000
stack
page read and write
540000
unkown
page readonly
2FD1000
heap
page read and write
34FF000
stack
page read and write
2FD1000
heap
page read and write
3949000
direct allocation
page read and write
9CF000
unkown
page read and write
411A000
unkown
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3611000
direct allocation
page execute and read and write
DE0000
heap
page read and write
891000
unkown
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
FD3000
heap
page read and write
2DC0000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3820000
direct allocation
page read and write
3999000
direct allocation
page read and write
3219000
heap
page read and write
7E18000
heap
page read and write
2BEC000
unkown
page read and write
81C0000
heap
page read and write
2FD1000
heap
page read and write
3C64000
unkown
page read and write
DA0000
unkown
page read and write
2FD1000
heap
page read and write
7F1000
unkown
page readonly
2E34000
heap
page read and write
16C13AA0000
trusted library allocation
page read and write
3002000
heap
page read and write
2FD1000
heap
page read and write
439C000
unclassified section
page read and write
3949000
direct allocation
page read and write
190000
unkown
page readonly
570000
heap
page read and write
2710000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
330E000
stack
page read and write
2710000
unkown
page readonly
FBB5FD000
stack
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
7DD4000
heap
page read and write
9D8000
unkown
page readonly
2DE0000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
1270000
unkown
page readonly
37AC000
unclassified section
page read and write
3013000
heap
page read and write
691000
unkown
page execute read
2FD1000
heap
page read and write
3205000
heap
page read and write
2FD1000
heap
page read and write
7B0000
heap
page read and write
24A4000
heap
page read and write
2F30000
trusted library allocation
page read and write
6A7000
unkown
page readonly
2FD1000
heap
page read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3013000
heap
page read and write
2E1B000
heap
page read and write
4FDF000
unclassified section
page execute and read and write
2FD1000
heap
page read and write
7DF8000
heap
page read and write
5080000
unkown
page read and write
E10000
heap
page read and write
3200000
heap
page read and write
3250000
trusted library allocation
page read and write
2C44000
heap
page read and write
3820000
direct allocation
page read and write
3013000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
2FD0000
heap
page read and write
16C122F2000
heap
page read and write
2FD1000
heap
page read and write
2FD1000
heap
page read and write
11FD2000
system
page read and write
3601000
heap
page read and write
2FD1000
heap
page read and write
16C122EF000
heap
page read and write
3013000
heap
page read and write
2912000
unkown
page read and write
2FD1000
heap
page read and write
2E2D000
heap
page read and write
16C122CA000
heap
page read and write
3752000
unclassified section
page read and write
36D0000
direct allocation
page read and write
2E70000
heap
page read and write
5D1000
unkown
page readonly
36D0000
direct allocation
page read and write
870000
direct allocation
page execute and read and write
394D000
direct allocation
page read and write
2FD1000
heap
page read and write
6A7000
unkown
page readonly
2FD1000
heap
page read and write
2FD1000
heap
page read and write
3217000
heap
page read and write
E5E000
stack
page read and write
59DF000
unclassified section
page execute and read and write
2C40000
heap
page read and write
2FD1000
heap
page read and write
F30000
direct allocation
page read and write
2FD1000
heap
page read and write
399D000
direct allocation
page read and write
2C10000
heap
page read and write
2EB0000
unkown
page execute and read and write
346D000
direct allocation
page execute and read and write
16C12040000
system
page execute and read and write
2912000
unkown
page read and write
2FD1000
heap
page read and write
E9E000
stack
page read and write
53C000
stack
page read and write
1A0000
unkown
page readonly
24A4000
heap
page read and write
50DA000
system
page execute and read and write
2FD1000
heap
page read and write
29D2000
unkown
page read and write
7ED0000
trusted library allocation
page read and write
16C13FAB000
trusted library allocation
page read and write
6A7000
unkown
page readonly
2700000
heap
page read and write
34DE000
direct allocation
page execute and read and write
16C120A6000
system
page execute and read and write
2FD1000
heap
page read and write
3729000
heap
page read and write
524C000
unkown
page read and write
8C4000
heap
page read and write
9B0000
unkown
page readonly
1A0000
unkown
page readonly
2FD1000
heap
page read and write
512E000
system
page execute and read and write
16C13E21000
trusted library allocation
page read and write
FA8000
heap
page read and write
2FD1000
heap
page read and write
There are 634 hidden memdumps, click here to show them.